Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-55044: n/a

0
Unknown
VulnerabilityCVE-2025-55044cvecve-2025-55044
Published: Wed Mar 18 2026 (03/18/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

The Trash Restore CSRF vulnerability in MuraCMS through 10.1.10 allows attackers to restore deleted content from the trash to unauthorized locations through CSRF. The vulnerable cTrash.restore function lacks CSRF token validation, enabling malicious websites to forge requests that restore content to arbitrary parent locations when an authenticated administrator visits a crafted webpage. Successful exploitation of the Trash Restore CSRF vulnerability results in unauthorized restoration of deleted content to potentially inappropriate or malicious locations within the MuraCMS website structure. When an authenticated administrator visits a malicious webpage containing the CSRF exploit, their browser automatically submits a hidden form that restores specified content from the trash to a location determined by the attacker through the parentid parameter. This can lead to restoration of previously deleted malicious content, placement of sensitive documents in public areas, manipulation of website navigation structure, or restoration of outdated content that was intentionally removed for security or compliance reasons.

AI-Powered Analysis

AILast updated: 03/18/2026, 16:28:45 UTC

Technical Analysis

CVE-2025-55044 is a CSRF vulnerability affecting MuraCMS through version 10.1.10, specifically in the cTrash.restore function responsible for restoring deleted content from the trash. The core issue is the absence of CSRF token validation in this function, which allows attackers to craft malicious web pages that, when visited by an authenticated administrator, automatically submit hidden forms to restore deleted content to arbitrary parent locations specified by the attacker via the parentid parameter. This unauthorized restoration can reintroduce malicious content previously deleted, expose sensitive documents by placing them in publicly accessible areas, disrupt website navigation by altering content structure, or restore outdated content removed for security or compliance reasons. The attack requires the victim to be an authenticated administrator and to visit a malicious webpage, but does not require any additional user interaction beyond page visit. While no known exploits have been reported in the wild, the vulnerability poses a significant risk due to the potential for content manipulation and unauthorized data exposure. No official patches or CVSS scores are currently available, but the vulnerability is publicly disclosed and should be addressed promptly. The lack of CSRF protection in a critical content management function highlights a design oversight in MuraCMS's security controls.

Potential Impact

The impact of CVE-2025-55044 is primarily on the integrity and confidentiality of website content managed by MuraCMS. Unauthorized restoration of deleted content can lead to several adverse outcomes: reintroduction of malicious or compromised files that could facilitate further attacks such as malware distribution or phishing; exposure of sensitive or confidential documents that were deleted to protect privacy or comply with regulations; disruption of website navigation and user experience by placing content in unintended locations; and potential reputational damage if outdated or inappropriate content is restored publicly. Since the attack requires an authenticated administrator to visit a malicious webpage, organizations with multiple administrators or less stringent browsing policies are at higher risk. The vulnerability does not directly affect availability but could indirectly cause service disruptions if malicious content leads to further compromise. Overall, the threat can undermine trust in the website’s content integrity and security, potentially leading to data breaches, compliance violations, and operational challenges.

Mitigation Recommendations

To mitigate CVE-2025-55044, organizations should implement the following specific measures: 1) Apply any available patches or updates from MuraCMS that address CSRF protections in the cTrash.restore function as soon as they are released. 2) If patches are not yet available, implement web application firewall (WAF) rules to detect and block suspicious POST requests targeting the trash restore endpoint, especially those lacking valid CSRF tokens or originating from external referrers. 3) Restrict administrator browsing to trusted internal networks or use browser security policies to limit exposure to malicious external sites. 4) Educate administrators about the risks of visiting untrusted websites while logged into the CMS. 5) Implement multi-factor authentication and session management controls to reduce the risk of session hijacking. 6) Conduct regular audits of restored content to detect unauthorized restorations promptly. 7) Consider temporarily disabling the trash restore functionality or restricting it to specific IP addresses or roles until a patch is applied. These targeted actions go beyond generic advice by focusing on immediate risk reduction and monitoring tailored to this vulnerability’s exploitation vector.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-08-06T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69bacf27771bdb1749ad8329

Added to database: 3/18/2026, 4:13:27 PM

Last enriched: 3/18/2026, 4:28:45 PM

Last updated: 3/19/2026, 6:52:05 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses